Cloud Access Security Broker vendor to use funding to help grow global go-to-market efforts.
One in four said something embarrassing has popped up on their phone while someone else was holding it, a recent survey found.
And 42 percent access corporate data over public Wi-Fi, a recent survey found.
The proof-of-concept worm could jump from one smart bulb to another via ZigBee wireless connectivity.
The CISO and the chief data officer must work well together, given the importance of secure data access. Here are tips for fostering a C-suite partnership.
OAuth 2.0 can be an effective authorization method. Here we offer tips on implementing and using an OAuth 2.0 authorization server using the OWIN framework.
And smartphones accounted for 78 percent of those infections, according to Nokia.
Pen Test Partners researchers were able to disable the car's alarm remotely.
Sixty-two percent ban their mobile workers from using free Wi-Fi hotspots, a recent survey found.
The maker of iPhones and iPads touts its new device management options for businesses ahead of a new iOS 7 update.
Security firm Bit9 says a majority of smartphones are running out-of-date and insecure operating systems that present a threat to critical business data. It has created a list of 12 of the most vulnerable smartphones. Guess who dominates the list?
Users of an 'unofficial' updater for Windows Phone 7 have gotten themselves in a jam that may prevent them from ever updating their phones again.
You dont need an IT staff or complex implementation to enjoy basic, common-sense data protection on your smartphone. Follow these 10 DIY tips for better smartphone security.
After it was revealed that a mobile security vulnerability exists in the browsers of BlackBerry's running 6.0, RIM issues a security advisory.
The security stalwart reports today that a fake Android security patch contains 'suspicious code.'
The Internet giant moves beyond removal of infected Android apps to fix malware outbreak at the Android Market.
Google moves quickly to remove the offending mobile apps. What should users concerned about smartphone security watch out for?
Internet security firm expands scope of service to include smartphones running the Android and BlackBerry mobile OSes.
Our review highlights key features of Symantec's new mobile security offering that allows mobile IT to configure and deploy security measures from a centralized administrators console.
Mobile users are three-fold more likely to divulge their login and password information to phishers, according to security software vendor Trusteer.
With the new version of AirWatch powered by Apple MDM, mobile management can control iOS 4 iPads, iPhones, and the apps allowed to run on them.
Mobile devices in the workplace rank high as potential risks in the list of emerging security trends for the coming year.
To help with mobile device management during the holiday shopping season, we outline the top 10 smartphone security mistakes to safeguard against.
Fresh study from AdaptiveMobile finds that mobile malware infections surged 33 percent this year and that Android-based devices are becoming particularly attractive to authors.
Symantec report finds that most enterprise employees become much more casual about the data they share and access via smartphones over the holidays.
Android 2.2 devices gain new administrative controls giving mobile management more browser-based security options.
The security giant enters the mobile enterprise with new solutions for mobile device management and mobile security.
We put four lesser-known wireless network security menaces in the spotlight by providing mobile IT guidance on how to combat them.
The networking giant's AnyConnect Secure Mobility Solution is now available at the iPhone App Store.
We highlight 20 Android security apps that will help mobile IT protect data and devices.
We offer tips for addressing smartphone security and wireless network security issues resulting from the influx of handsets in the enterprise.
Need to configure and connect to WPA networks in recent versions of Leopard and Snow Leopard? Our wireless security tutorial outlines the steps mobile IT staff need to follow to use enterprise Wi-Fi encryption and 802.1X in Mac OS X.
The first SMS Trojan targeting mobile devices running the mobile Linux Android operating system is discovered by Kaspersky Lab researchers.
New solution from BIO-Key lets enterprises use fingerprint biometric data to identify and authenticate smartphone, laptop, tablet and desktop users.
Research In Motion is testing a free, cloud-based mobile security service for consumers that offers remote backup, lock and wipe functionality for BlackBerrys.
Mobile IT and Google Apps administrators now have new mobile device management options for iPhone, Nokia and Windows Mobile devices. But what about Android devices?
Mobile security managers should be sure to know what's cause for concern -- and what isn't -- when it comes to Wi-Fi security issues.
We outline the steps needed to securely send e-mails and transfer files.
Mobile security covers more than smartphones and laptops. We evaluate the Kanguru Remote Management Console Cloud Edition, an affordable way to protect data on thumb drives.
The FBI and FCC are studying the details of the recent iPad security breach.
We outline the three mobile security approaches mobile management can take to ensure that company data is protected.
Flash drives are super convenient for transferring data, but to ensure they don't create a mobile security crisis, we outline steps for encrypting USB drives.
In this comprehensive review, CACE Pilot, which cuts large-volume traffic captures into smaller data sets for easier evaluation, is tested on wireless networks and LANs.
Verizon Business rolled out a new cloud-based service that will make it much easier for mobile office workers to securely access their corporate networks.
We highlight some of the best, free tools mobile management can use to evaluate Wi-Fi network security issues.
Our mobile IT managers guide to deploying and supervising personal smarpthones in the enterprise covers mobile security, the use of mobile apps and policy creation.
Mobile IT managers may know smartphone security is critical, but may not understand the reasons why. We outline smartphone vulnerabilities you should be aware of before crafting mobile security policy.
Mobile management software firm Zenprise today rolls out remote control for BlackBerry troubleshooting and mobile security. Plus, enterprise management support for the iPad.
A mobile app for iPhone strengthens security to make the mobile device IT friendly. Also, AT&T rolls out two new mobile Web applications for Oracle CRM On Demand.
Highlights of seven advanced, free security applications covering VPNs, encrypting flash drives and locking down public workstations.
BitLocker's comprehensive hard drive encryption means surefire laptop security.
Recognizing telemedicine trend, Fiberlink's cloud-based telehealth solution offers streamlined mobile management and mobile security HIPAA compliance.
Recognizing the exploding demand for mobile applications and the need for mobile security, Trust Digital developed a solution for mobile IT to deploy iPhones -- and manage them -- from one centralized location.
Rogue access points, data interception, DoS downtime -- these are all Wi-Fi threats that can spell trouble for mobile security managers. We outline our Top 10 Wi-Fi threats and offer guidance on how to protect against them.
Securing mobile data isn't just about securing devices: It's also about ensuring the security of network transport infrastructure. Juniper's latest offering improves mobile networking security and includes support from Verizon and Sprint.
When it comes to mobile applications and smartphone security, is Apple's closed iPhone OS strategy better than Google's open Android approach?
Deploying hardware-based, self-encrypting drives for laptops can reduce mobile security risks.
Google adds smartphone security features to mobile enterprise apps to make them more mobile IT-friendly. Is this a push to take on RIM in the workplace?
Five quick steps IT mobile managers can take to keep smartphones secure as more employees bring their own handsets into the office.
Displaying recent articles. Read More in Security »